mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-07-09 01:58:53 +00:00

* Delete old docs and rename the openmetadata-docs-v1 to openmetadata-docs * Delete old docs and rename the openmetadata-docs-v1 to openmetadata-docs * Delete old docs and rename the openmetadata-docs-v1 to openmetadata-docs
1.9 KiB
1.9 KiB
title | slug |
---|---|
Custom OIDC SSO for Kubernetes | /deployment/security/custom-oidc/kubernetes |
Custom OIDC SSO for Kubernetes
Check the Helm information here.
Once the Client Id
and Client Secret
are generated, see the snippet below for an example of where to
place the client id value and update the authorizer configurations in the values.yaml
.
Before 0.12.1
global:
authorizer:
className: "org.openmetadata.service.security.DefaultAuthorizer"
containerRequestFilter: "org.openmetadata.service.security.JwtFilter"
initialAdmins:
- "user1"
- "user2"
principalDomain: "open-metadata.org"
authentication:
provider: "custom-oidc"
publicKeys:
- "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs"
authority: "http://localhost:8080/realms/myrealm"
clientId: "{Client ID}"
callbackUrl: "http://localhost:8585/callback"
airflow:
openmetadata:
authProvider: "custom-oidc"
customOidc:
clientId: ""
# absolute path of secret file on airflow instance
secretKey: ""
tokenEndpoint: ""
After 0.12.1
global:
authorizer:
className: "org.openmetadata.service.security.DefaultAuthorizer"
containerRequestFilter: "org.openmetadata.service.security.JwtFilter"
initialAdmins:
- "user1"
- "user2"
principalDomain: "open-metadata.org"
authentication:
provider: "custom-oidc"
publicKeys:
- "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs"
authority: "http://localhost:8080/realms/myrealm"
clientId: "{Client ID}"
callbackUrl: "http://localhost:8585/callback"
Note: Follow this guide to configure the ingestion-bot
credentials for
ingesting data from Airflow.